MFA APT security awareness OS Dark Web smishing FTP antivirus IoT spam firewall network ransomware Defense- in-depth Cyber Security social engineering defense evasion vulnerability escalation rootkit DDoS SyssecAdmin admin incident response password cyber attack risk assessment passphrase identity theft compliance training Security Operations encryption BEC botnet bug resilience zero- day PHI security policy worm malware HIPAA IOC EDR packet cryptography confidentiality risk hacker PII vishing Proofpoint phishing breach insider threat pentest CIA triad integrity IPS VPN exploit spoofing business continuity IP incident availability IDS WISP virus Cyber Defense spyware MFA APT security awareness OS Dark Web smishing FTP antivirus IoT spam firewall network ransomware Defense- in-depth Cyber Security social engineering defense evasion vulnerability escalation rootkit DDoS SyssecAdmin admin incident response password cyber attack risk assessment passphrase identity theft compliance training Security Operations encryption BEC botnet bug resilience zero- day PHI security policy worm malware HIPAA IOC EDR packet cryptography confidentiality risk hacker PII vishing Proofpoint phishing breach insider threat pentest CIA triad integrity IPS VPN exploit spoofing business continuity IP incident availability IDS WISP virus Cyber Defense spyware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
MFA
APT
security awareness
OS
Dark Web
smishing
FTP
antivirus
IoT
spam
firewall
network
ransomware
Defense-in-depth
Cyber Security
social engineering
defense evasion
vulnerability
escalation
rootkit
DDoS
SyssecAdmin
admin
incident response
password
cyber attack
risk assessment
passphrase
identity theft
compliance
training
Security Operations
encryption
BEC
botnet
bug
resilience
zero-day
PHI
security policy
worm
malware
HIPAA
IOC
EDR
packet
cryptography
confidentiality
risk
hacker
PII
vishing
Proofpoint
phishing
breach
insider threat
pentest
CIA triad
integrity
IPS
VPN
exploit
spoofing
business continuity
IP
incident
availability
IDS
WISP
virus
Cyber Defense
spyware